Windows 10 Creators Update will add tab previews and a night mode

Windows 10’s Creators Update will have its fair share of pleasant surprises, apparently. Microsoft has released a new Windows Insider preview that stuffs in quite a few new features, some of which you might just use every day. For one, its Edge browser now includes tab previews. This isn’t a novel concept (hi, Opera), but it’ll be immensely helpful if you have loads of tabs open and don’t want to play a guessing game. Also, Microsoft’s Flash crackdown is in full effect: Edge now blocks untrusted Flash content as a matter of course, and you’ll have to click to play it. There’s plenty more beyond the web. The preview introduces a “lower blue light” option that, like F.lux or the night modes on some phones, will gradually shift colors to ease the strain on your eyes (and theoretically, help you sleep) when it gets dark. And did we mention that you can organize the Start menu’s tiles into folders? It’ll seem familiar if you’ve used Windows Phone or Windows 10 Mobile, but it’s definitely welcome if you’d like to have a lot of app shortcuts. Other improvements? You’ll find a more app-centric sharing option with increased awareness of what you’re running and what you like to use. Windows is also building in a selective screen capture mode that was previously limited to OneNote, a more formal introduction to Cortana for new users, an on-demand “refresh Windows” option to reinstall the OS and better support for very high resolution displays. If you’re an Insider and are willing to live with the inevitable glitchiness of a preview, you’ll definitely want to give this a peek. Via: The Verge , ZDNet Source: Microsoft

Read More:
Windows 10 Creators Update will add tab previews and a night mode

Linux Kernel 4.9 Officially Released

“As expected, today, December 11, 2016, Linus Torvalds unleashed the final release of the highly anticipated Linux 4.9 kernel, ” reports Softpedia. prisoninmate shares their article: Linux kernel 4.9 entered development in mid-October, on the 15th, when Linus Torvalds decided to cut the merge window short by a day just to keep people on their toes, but also to prevent them from sending last-minute pull requests that might cause issues like it happened with the release of Linux kernel 4.8, which landed just two weeks before first RC of Linux 4.9 hit the streets… There are many great new features implemented in Linux kernel 4.9, but by far the most exciting one is the experimental support for older AMD Radeon graphics cards from the Southern Islands/GCN 1.0 family, which was injected to the open-source AMDGPU graphics driver… There are also various interesting improvements for modern AMD Radeon GPUs, such as virtual display support and better reset support, both of which are implemented in the AMDGPU driver. For Intel GPU users, there’s DMA-BUF implicit fencing, and some Intel Atom processors got a P-State performance boost. Intel Skylake improvements are also present in Linux kernel 4.9. There’s also dynamic thread-tracing, according to Linux Today. (And hopefully they fixed the “buggy crap” that made it into Linux 4.8.) LWN.net calls this “by far the busiest cycle in the history of the kernel project.” Read more of this story at Slashdot.

Link:
Linux Kernel 4.9 Officially Released

Researchers Point Out ‘Theoretical’ Security Flaws In AMD’s Upcoming Zen CPU

An anonymous reader writes from a report via BleepingComputer: The security protocol that governs how virtual machines share data on a host system powered by AMD Zen processors has been found to be insecure, at least in theory, according to two German researchers. The technology, called Secure Encrypted Virtualization (SEV), is designed to encrypt parts of the memory shared by different virtual machines on cloud servers. AMD, who plans to ship SEV with its upcoming line of Zen processors, has published the technical documentation for the SEV technology this past April. The German researchers have analyzed the design of SEV, using this public documentation, and said they managed to identify three attack channels, which work, at least in theory. [In a technical paper released over the past weekend, the researchers described their attacks:] “We show how a malicious hypervisor can force the guest to perform arbitrary read and write operations on protected memory. We describe how to completely disable any SEV memory protection configured by the tenant. We implement a replay attack that uses captured login data to gain access to the target system by solely exploiting resource management features of a hypervisor.” AMD is scheduled to ship SEV with the Zen processor line in the first quarter of 2017. Read more of this story at Slashdot.

Read More:
Researchers Point Out ‘Theoretical’ Security Flaws In AMD’s Upcoming Zen CPU

New Stegano Exploit Kit Hides Malvertising Code In Banner Pixels

An anonymous reader quotes a report from BleepingComputer: For the past two months, a new exploit kit has been serving malicious code hidden in the pixels of banner ads via a malvertising campaign that has been active on several high profile websites. Discovered by security researchers from ESET, this new exploit kit is named Stegano, from the word steganography, which is a technique of hiding content inside other files. In this particular scenario, malvertising campaign operators hid malicious code inside PNG images used for banner ads. The crooks took a PNG image and altered the transparency value of several pixels. They then packed the modified image as an ad, for which they bought ad displays on several high-profile websites. Since a large number of advertising networks allow advertisers to deliver JavaScript code with their ads, the crooks also included JS code that would parse the image, extract the pixel transparency values, and using a mathematical formula, convert those values into a character. Since images have millions of pixels, crooks had all the space they needed to pack malicious code inside a PNG photo. When extracted, this malicious code would redirect the user to an intermediary ULR, called gate, where the host server would filter users. This server would only accept connections from Internet Explorer users. The reason is that the gate would exploit the CVE-2016-0162 vulnerability that allowed the crooks to determine if the connection came from a real user or a reverse analysis system employed by security researchers. Additionally, this IE exploit also allowed the gate server to detect the presence of antivirus software. In this case, the server would drop the connection just to avoid exposing its infrastructure and trigger a warning that would alert both the user and the security firm. If the gate server deemed the target valuable, then it would redirect the user to the final stage, which was the exploit kit itself, hosted on another URL. The Stegano exploit kit would use three Adobe Flash vulnerabilities (CVE-2015-8651, CVE-2016-1019 or CVE-2016-4117) to attack the user’s PC, and forcibly download and launch into execution various strains of malware. Read more of this story at Slashdot.

Read the original post:
New Stegano Exploit Kit Hides Malvertising Code In Banner Pixels

Chrome 55 Now Blocks Flash, Uses HTML5 By Default

An anonymous reader quotes Bleeping Computer: Chrome 55, released earlier this week, now blocks all Adobe Flash content by default, according to a plan set in motion by Google engineers earlier this year… While some of the initial implementation details of the “HTML5 By Default” plan changed since then, Flash has been phased out in favor of HTML5 as the primary technology for playing multimedia content in Chrome. Google’s plan is to turn off Flash and use HTML5 for all sites. Where HTML5 isn’t supported, Chrome will prompt users and ask them if they want to run Flash to view multimedia content. The user’s option would be remembered for subsequent visits, but there’s also an option in the browser’s settings section, under Settings > Content Settings > Flash > Manage Exceptions, where users can add the websites they want to allow Flash to run by default. Exceptions will also be made automatically for your more frequently-visited sites — which, for many users, will include YouTube. And Chrome will continue to ship with Flash — as well as an option to re-enable Flash on all sites. Read more of this story at Slashdot.

Read this article:
Chrome 55 Now Blocks Flash, Uses HTML5 By Default

Vudu Movies On Us Offers Thousands of Free Movies, If You Don’t Mind Some Ads

It’s annoying to pay for a movie service and wonder where all the good movies are . Vudu’s hoping that you won’t mind that feeling quite as much if you get your movies for free (with a few ads, of course). Read more…

View the original here:
Vudu Movies On Us Offers Thousands of Free Movies, If You Don’t Mind Some Ads

Chrome 54 Arrives With YouTube Flash Embed Rewriting To HTML5

Krystalo quotes a report from VentureBeat: Google today launched Chrome 54 for Windows, Mac, and Linux. This release is mainly focused on developers, but the improvements to how the browser handles YouTube embeds is also noteworthy. You can update to the latest version now using the browser’s built-in silent updater, or download it directly from google.com/chrome. Chrome 54 rewrites YouTube Flash players to use the YouTube HTML5 embed style. YouTube ditched Flash for HTML5 by default in January 2015, but the old embeds still exist all over the web. Google says the change improves both performance and security for its desktop browser. The report adds that “Chrome also now provides support for the custom elements V1 spec, ” which allows “developers to create custom HTML tags as well as define their API and behavior in JavaScript.” BroadcastChannel API will also be implemented “to allow one-to-many messaging between windows, tabs, iframes, web workers, and service workers.” You can read more about Chrome 54 on Google’s blog post. Read more of this story at Slashdot.

Read More:
Chrome 54 Arrives With YouTube Flash Embed Rewriting To HTML5

Intel Launches Flurry of 3D NAND-Based SSDs For Consumer and Enterprise Markets

MojoKid writes: Intel launched a handful of new SSD products today that cover a broad spectrum of applications and employ 3D NAND technology. The SSD 600p Series is offered in four capacities ranging from 128GB, to 256GB, 512GB and 1TB. The drivers are targeted at consumer desktops and notebooks and are available in the M.2 form-factor. The entry-level 128GB model offers sequential reads and writes of up to 770 MB/sec and 450 MB/sec respectively. At higher densities, the multi-channel 1TB model offers sequential reads and writes that jump to 1, 800 MB/sec and 560 MB/sec respectively. The 128GB SSD 600p weighs in at $69, while the 1TB model is priced at $359, or about .36 cents per GiB. For the data center, Intel has also introduced the DC P3520 and DC S3520 Series SSDs in 2.5-inch and PCIe half-height card form-factors. Available in 450GB to 2TB capacities, the range-topping 2TB model offers random reads/writes of 1, 700 MB/sec and 1, 350 MB/sec respectively. Finally, Intel launched the SSD E 6000p (PCIe M.2) and SSD E 5420s Series (SATA). The former supports Core vPro processors and is targeted at point-of-sale systems and digital signage. The latter is aimed at helping customers ease the transition from HDDs to SSDs in IoT applications. Read more of this story at Slashdot.

Read the article:
Intel Launches Flurry of 3D NAND-Based SSDs For Consumer and Enterprise Markets

The New Star Trek TV Show Has a Title and a Starship: Discovery

Behold the U.S.S. Discovery, designation NCC-1031. What’s really cool is that it’s based on concept art the legendary Ralph McQuarrie did for the first Trek motion picture. See it in action in the show’s first teaser! Read more…

Read more here:
The New Star Trek TV Show Has a Title and a Starship: Discovery